Rtfm: Red Team Field Manual

COMPUTERS / General



The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

price: $9.00 Buy Now

Download Now Read Online

Rtfm


Download Now Read Online

Author by : Ben Clark
Languange Used : en
Release Date : 2014-02-11
Publisher by :

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who

Blue Team Field Manual


Download Now Read Online

Author by : Alan White
Languange Used : en
Release Date : 2017-01-13
Publisher by : Createspace Independent Publishing Platform

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecur

Red Team


Download Now Read Online

Author by : Micah Zenko
Languange Used : en
Release Date : 2015-11-03
Publisher by : Basic Books

An international security expert shows how competitive organizations can get—and stay—ahead by thinking li

The Browser Hacker S Handbook


Download Now Read Online

Author by : Wade Alcorn
Languange Used : en
Release Date : 2014-02-26
Publisher by : John Wiley & Sons

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a p

Blue Team Handbook


Download Now Read Online

Author by : Don Murdoch
Languange Used : en
Release Date : 2014-08-03
Publisher by : CreateSpace

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol h

Penetration Testing


Download Now Read Online

Author by : Georgia Weidman
Languange Used : en
Release Date : 2014-06-14
Publisher by : No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and app

Violent Python


Download Now Read Online

Author by : TJ O'Connor
Languange Used : en
Release Date : 2012-12-28
Publisher by : Newnes

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a pra

Leave a Reply